AttackDetection Profile Banner
Attack Detection Profile
Attack Detection

@AttackDetection

Followers
2K
Following
32
Media
8
Statuses
194

Attack Detection Team at @ptsecurity

Joined March 2016
Don't wanna be here? Send us removal request.
@AttackDetection
Attack Detection
19 days
🔥 Yep, the hot one in React! We’ve added Suricata signatures for the CVSS 10.0 #React2Shell (#CVE-2025-55182) - a unauth RCE vulnerability in React Server Components 👉 Check it out at https://t.co/t6TMflynJX Stay protected! #suricata #ids #cybersecurity
0
0
0
@AttackDetection
Attack Detection
2 months
🚨Suricata Rules Update - Android Threats🚨 New Android-focused network detection rules are now live on https://t.co/Bom73mlzFQ: • SpyNote • SuperCard X • Konfety • DCHSpy • RedHook • LunaSpy • ClayRAT • Brokewell • some generics #Suricata #AndroidMalware #CyberSecurity
0
0
0
@AttackDetection
Attack Detection
5 months
🚨We have added a #Suricata signature for the recent #SharePoint RCE (#CVE-2025-53770, CVE-2025-49706) exploitation attributes to our open ruleset. It detects signs of successful machine key leakage. 🔗Check it out: https://t.co/hKVScOqG0n #cybersecurity #ids
0
0
0
@AttackDetection
Attack Detection
5 months
@grok is that great?
1
0
0
@AttackDetection
Attack Detection
6 months
🚨We have added #suricata signature for the recent #Fortiweb (CVE-2025-25257) vulnerability in our open ruleset. Check it out: 👉 https://t.co/AEoLKzWj0f #cybersecurity #ids #fortinet
1
1
0
@AttackDetection
Attack Detection
6 months
🚨We have added new #suricata signatures for the recent #CitrixBleed2 (CVE-2025-5777) vulnerability in our open ruleset. Not only for an attempt, but for detection of a successful exploitation as well Check it out: 👉 https://t.co/gf4sr9bOyp #cybersecurity #ids #citrix
0
0
0
@AttackDetection
Attack Detection
7 months
🚨 Malware Suricata Rules Update Available on https://t.co/Bom73mm7vo! 🚨 🛑 Remcos, XWorm RAT 🛑 Stealc v2 Stealer 🛑 Filsh Backdoor 🛑 Andromeda Botnet 🛑 PhantomEnigma Banker (see TI Report https://t.co/ciEKVmPrOH) #Suricata
Tweet card summary image
global.ptsecurity.com
In this blog you can find information about current attacks by hacker groups worldwide, analysis of their tools, incident reports, threat actors' TTPs, indicators of compromise, and detection names...
0
0
0
@AttackDetection
Attack Detection
7 months
🚨 We've added a new signature to our Suricata ruleset for the critical vulnerability CVE-2025-49113 in Roundcube, previously reproduced by @ptswarm. This RCE vulnerability potentially exposes millions of hosts worldwide. Update your rules now: https://t.co/Bom73mlzFQ #Suricata
0
0
0
@AttackDetection
Attack Detection
9 months
🐍 Suricata rules update ! We’ve added detections for newly disclosed RCE vulns: - Apache Tomcat (CVE-2025-24813) - Ingress NGINX (CVE-2025-1974) 🆕 Detects for tunnel services (tunnelto, Telebit, Pinggy), Rclone and AdaptixC2 activity. See full list →
0
0
0
@AttackDetection
Attack Detection
1 year
We're dropping a massive malware signature update 🎭 Highlights: RustyNet loader, WorldWind stealer, Slam RAT, nasty XWorm, SpyNote, Hydra, Zanubis ...and plenty more! 🔗
0
0
2
@AttackDetection
Attack Detection
1 year
Guess who's back? 🎉 Our Suricata ruleset has found a new home at https://t.co/Bom73mlzFQ! Enable source ptrules/open in Suricata-Update to stay ahead of threats.
1
3
7
@AttackDetection
Attack Detection
4 years
Spring Core RCE 0day aka Spring4Shell came out recently. Detect exploitation attempts with our #suricata rule:
1
3
2
@AttackDetection
Attack Detection
4 years
One can get #Zabbix panel admin rights in one request with CVE-2022-23131. But you can detect it easily with our #suricata rule. We worked on possible rule bypasses and false positive rate https://t.co/BPxd5jYxfM
0
0
2
@AttackDetection
Attack Detection
4 years
Rule updates: our #suricata rules detect all known Log4Shell CVE-2021-44228 bypasses for now. Also added a rule to detect a successful log4j exploitation!
0
3
3
@AttackDetection
Attack Detection
4 years
Breaking news, the internet is under fire again! Releasing #suricata detection rule for log4j aka Log4Shell and CVE-2021-44228 as soon as possible. We will update the rule along with the new exploits and bypasses found. https://t.co/ZiS41upfzh
2
2
8
@AttackDetection
Attack Detection
4 years
Good: Use our #suricata rules to detect malicious attempts of the new CVE-2021-41773 #Apache HTTP Server dir traversal. Better: Patch your apache The best: Do both! https://t.co/aeYmm9QvPJ
@ptswarm
PT SWARM
4 years
🔥 We have reproduced the fresh CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49. If files outside of the document root are not protected by "require all denied" these requests can succeed. Patch ASAP! https://t.co/6JrbayDbqG
1
3
5
@AttackDetection
Attack Detection
4 years
How to get a system shell on any windows version? Use #SystemNightmare exploit. How to detect SystemNightmare usage in a network? Use our rules! Oh, here they are:
0
3
2
@AttackDetection
Attack Detection
4 years
We released rules for #suricata in order to detect exploitation of a new vuln #PetitPotam. Also detection of a successful attempt inside: https://t.co/9sewjOKnkJ
@topotam77
topotam
4 years
Hi all, MS-RPRN to coerce machine authentication is great but the service is often disabled nowadays by admins on most orgz. Here is one another way we use to elicit machine account auth via MS-EFSRPC. Enjoy!! :) https://t.co/AGiS4f6yt8
1
8
13
@AttackDetection
Attack Detection
4 years
Use our #suricata rules to detect both #PrintNightmare (CVE-2021-1675) exploits. Adding printer driver across the network is rare but still possible case, so there might be a few of false alerts. Tell us if you get some. https://t.co/jeTA0r5QGc
1
5
14
@AttackDetection
Attack Detection
5 years
xfreerdp software in your network? It might be some malicious activity! Detect it with our #suricata rule, works for security level rdp only. Good for some other open source clients as well.
0
0
1